An anonymous mutual authentication scheme for rfid-based transportation system

S Ji, S Liu, C Wang, R Qi, J Shen - Electronics, 2020 - mdpi.com
In traditional transportation, each driver usually relies on their experience to determine an
appropriate route, which may shorten the driving time and transport cost. However, this may …

[PDF][PDF] 基于云数据库的低成本RFID 认证协议

童嘉庆, 董庆宽, 霍伟光 - 密码学报, 2015 - jcr.cacrnet.org.cn
随着物联网的广泛部署以及云计算的快速发展, 越来越多的物体之间需要相互识别, 通信.
一方面, 海量的物品将依靠RFID 技术进行识别和认证以接入互联网来完成彼此之间的通信 …

[PDF][PDF] Authentication techniques in cloud and mobile cloud computing

M Hasan, MH Riaz, MA Rahman - International Journal of …, 2017 - researchgate.net
A major challenge in cloud and mobile cloud computing is to ensure security and privacy of
user's personal information (eg, financial data, health record, location information) from …

Lightweight RFID authentication protocol for cloud services using PUF encryption

Q Ye, ZW Sun - 2021 33rd Chinese Control and Decision …, 2021 - ieeexplore.ieee.org
To solve the problem that the existing Radio Frequency Identification (RFID) system
authentication protocol is not suitable for large-scale RFID tag system, a lightweight RFID …

VANET Cloud security model

TH Kim - J Intell Technol, 2016 - airitilibrary.com
Vehicular Ad Hoc Networks (VANET) is a temporary networks of vehicles on road. VANET
Cloud is new computing paradigm which utilizes the resources of cloud in VANETs and …

Cloud-based lightweight RFID healthcare privacy protection protocol

K Fan, W Wang, Y Wang, H Li… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
Researchers and engineers have paid more attention to cloud-based application systems,
whose features are virtualization and services provisioning. Fortunately the technology can …

Shifting hash table: An efficient hash table with delicate summary

J Jiang, Y Yan, M Zhang, B Yin, Y Jiang… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Hash tables have been broadly used in many security applications. These applications
require fast query speed and high memory efficiency. However, the query speed degrades …

A tree-based authentication scheme for a cloud toll/traffic RFID system

A Alabrah, M Bassiouni - 2015 IEEE Vehicular Networking …, 2015 - ieeexplore.ieee.org
Existing RFID schemes targeting traffic management contexts are mainly conceptual and
prototypical. Little attention has been given to the important issue of authentication. With the …

Cloud-based radio frequency identification authentication protocol with location privacy protection

Q Dong, M Chen, L Li, K Fan - International Journal of …, 2018 - journals.sagepub.com
With the development of the Internet of things and cloud storage, a large number of objects
access to the Internet through radio frequency identification technology, cloud-based radio …

An RFID cloud authentication protocol for object tracking system in supply chain management

S Anandhi, R Anitha, V Sureshkumar - … of the Computer Society of India …, 2016 - Springer
Abstract Radio Frequency Identification (RFID) is a valuable technology for tracking objects
in the supply chain. Security and privacy requirements arise with the fast deployment of …